نتایج جستجو برای: stet buffer

تعداد نتایج: 42947  

Journal: :Physica Status Solidi A-applications and Materials Science 2023

Submicrometer‐thick AlGaN/GaN high‐electron‐mobility transistor (HEMT) epilayers grown on silicon substrate with a state‐of‐the art vertical buffer breakdown field as high 6 MV cm −1 enabling voltage of 250 V for short gate‐to‐drain distances despite such thin structure are reported. HEMTs gate length 100 nm exhibit good DC characteristics low drain‐induced barrier, going mV DS 30 V. Breakdown ...

2005
Martín Abadi Mihai Budiu Úlfar Erlingsson Jay Ligatti

Control-Flow Integrity (CFI) means that the execution of a program dynamically follows only certain paths, in accordance with a static policy. CFI can prevent attacks that, by exploiting buffer overflows and other vulnerabilities, attempt to control program behavior. This paper develops the basic theory that underlies two practical techniques for CFI enforcement, with precise formulations of hy...

1982
Alan K. Melby

At COLING80, we reported on an Interactive Translation System called ITS. We will discuss t h r ee p rob lems in the design of the first version of ITS: (1) human f ac to r s , (2) the "all or noth ing" syndrome, and (3) traditional centralized processing. We will also discuss a new vers ion of ITS, which is now being programmed. This new vers ion will hopeful ly o v e r c o m e these p rob lem...

2011
Elmar Eisemann Sylvain Lefebvre

Acknowledgements I would like to thank Sylvain Lefebvre for his help concerning the pBuffers and 3DSLib and other OpenGL questions. I would like to thank Gilles Debunne for libQGLViewer. Probably one of the most useful libraries available. I would like to thank Samuel Hornus for his comments and proof reading and Martin Eisemann for all his comments as well as Stephan Camerer for all the discus...

Journal: :JSW 2014
Chunguang Kuang Chunlei Wang Minhuan Huang

-Since the first buffer overflow problem occurred, many detection techniques have been presented. These techniques are effective in detecting most attacks, but some attacks still remain undetected. In order to be more effective, a memory-size-assisted buffer overflow detection(MBOD) is presented. The key feature of buffer overflow is that the size of the source memory is bigger than the size of...

2001
David Larochelle David Evans

Buffer overflow attacks may be today’s single most important security threat. This paper presents a new approach to mitigating buffer overflow vulnerabilities by detecting likely vulnerabilities through an analysis of the program source code. Our approach exploits information provided in semantic comments and uses lightweight and efficient static analyses. This paper describes an implementation...

Journal: :CoRR 2014
Rakesh Gupta

This paper describes a CMOS analogy voltage supper buffer designed to have extremely low static current Consumption as well as high current drive capability. A new technique is used to reduce the leakage power of class-AB CMOS buffer circuits without affecting dynamic power dissipation. The name of applied technique is TRANSISTOR GATING TECHNIQUE, which gives the high speed buffer with the redu...

1994
J. Bradley Chen

We used memory reference traces from a DEC Ultrix system running the X11 window system from MIT Project Athena and several freely available X11 applications to measure different aspects of memory system behavior and performance. Our measurements show that memory behavior for X11 workloads differs in several important ways from workloads more traditionally used in cache performance studies. User...

2013
Jussi Mäki

Buffer overflows still remain a problem for software today. Even with address space randomization and non-executable stacks software remains vulnerable to clever exploits. In this paper we introduce the buffer overflow through a pratical example and take a retrospective look on the past 25 years of the arms race on buffer overflow exploits and protections.

2003
Victor M. DeLaLuz Mahmut T. Kandemir Anand Sivasubramaniam Mary Jane Irwin Narayanan Vijaykrishnan

Translation Look-aside Buffer (TLB), which is small Content Addressable Memory (CAM) structure used to translate virtual addresses to physical addresses, can consume significant energy in some architectures. In addition, its power density is high, due to its small area. Consequently, reducing power consumption of TLB is important for both high-end and low-end systems. While a large TLB might be...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید